Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,206,853 papers from all fields of science
Search
Sign In
Create Free Account
Phishing
Known as:
Phishers
, Phishing scam
, Phising
Expand
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Black hat
Certificate authority
Christopher Abad
Cybercrime countermeasures
Expand
Broader (1)
Spamming
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A visualization cybersecurity method based on features' dissimilarity
Rabah AlShboul
,
F. Thabtah
,
Neda Abdelhamid
,
Mofleh Al-Diabat
Computers & security
2018
Corpus ID: 49584440
Review
2016
Review
2016
Overlapping clustering: A review
Said Baadel
,
F. Thabtah
,
Joan Lu
Sai
2016
Corpus ID: 16074762
Data Clustering or unsupervised classification is one of the main research area in Data Mining. Partitioning Clustering involves…
Expand
2015
2015
Cybersecurity: Recognizing the Risk and Protecting Against Attacks
Kristine Shields
2015
Corpus ID: 169887399
2012
2012
Error patterns and automatic L1 identification
Yves Bestgen
,
S. Granger
,
J. Thewissen
2012
Corpus ID: 56340336
Review
2011
Review
2011
Enterprise risk and security management: Data, text and Web mining
Hsinchun Chen
,
M. Chau
,
Shu-Hsing Li
Decision Support Systems
2011
Corpus ID: 1623175
2009
2009
A concise cost analysis of Internet malware
Suleyman Kondakci
Computers & security
2009
Corpus ID: 15134023
2009
2009
Solution analysis for SIP security threats
Warodom Werapun
,
A. A. E. Kalam
,
B. Paillassa
,
J. Fasson
International Conference on Multimedia Computing…
2009
Corpus ID: 15478332
Session Initial Protocol (SIP) is widely used for handling multimedia signaling. Because SIP is widely used in many multimedia…
Expand
2007
2007
Persuasion as Education for Computer Security
Alain Forget
,
Sonia Chiasson
,
R. Biddle
2007
Corpus ID: 5943362
Most organisations realise the importance of computer security, yet many struggle with how to teach and influence their users to…
Expand
Highly Cited
2006
Highly Cited
2006
Fighting phishing at the user interface
Min Wu
2006
Corpus ID: 45972587
The problem that this thesis concentrates on is phishing attacks. Phishing attacks use email messages and web sites designed to…
Expand
Review
2004
Review
2004
Secure Public Instant Messaging: A Survey †
Mohammad Mannan
2004
Corpus ID: 6672787
We provide a survey on security features and threats to exist ing Instant Messaging (IM) networks and discuss how currently…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE